Understanding technologies of terror
نویسندگان
چکیده
The variety of weapons of mass destruction are intended to create the maximum possible fear, death, destruction, and general terror in the target region or nation, particularly with new and creative ways of using them. An understanding of how these weapons work, the ways they may be used, and the scope of their destruction can contribute to effectively combating their effects. This article examines these weapons—nuclear, electromagnetic pulse, radiological, chemical and biological technologies—as well as policy approaches to defending against them. The development of national programs directed toward the understanding, potential use, and response to weapons of mass destruction by the United States, Japan and the Soviet Union are reviewed and compared, as are the international agreements that have thus far addressed the possible use of such weapons. q 2005 Elsevier Ltd. All rights reserved.
منابع مشابه
Terror management theory: Theoretical concepts, experimental research and Critics
Terror management theory (Greenberg, Pyszczynski & Solomon, 1986) considers the desire for survival as the underlying motivation for human behavior. Given his cognitive capacity and ability to think abstractly about the future, man realizes that his death is inevitable, which causes Paralysing terror. Man has developed certain psychological structures to protect himself from this terror. A cult...
متن کاملMarket Civilization and Its Clash with Terror
that war is politics by other means is a reminder that the primary goal of the war against terror is not to defeat and eliminate those who aim to attack the United States and its allies. Rather it is to enhance the security of the American people and their allies. These goals are the same only if terrorist organizations such as al-Qaeda are isolated groups of criminals that need only be found a...
متن کاملThe Crime-Terror Nexus: Transformation, Alliance, Convergence
The crime-terror nexus includes two independent, but related, components. First, it incorporates the straightforward involvement in criminal activities by terrorists as a source of funding, and second, it refers to the linkages between organized criminal organizations and terrorist groups. Indeed, the criminal and political organizations appear to be learning from each other, adopting each othe...
متن کاملTerror Queues
This article presents the first models developed specifically for understanding the infiltration and interdiction of ongoing terror plots by undercover intelligence agents, and does so via novel application of ideas from queueing theory and Markov population processes. The resulting “terror queue” models predict the number of undetected terror threats in an area from agent activity/utilization ...
متن کاملUsing Sequence Package Analysis as a New Natural Language Understanding Method for Mining Government Recordings of Terror Suspects
Three years after 9/11, the Justice Department made the astounding revelation that more than 120,000 hours of potentially valuable terrorismrelated recordings had yet to be transcribed. Clearly, the government’s efforts to obtain such recordings have continued. Yet there is no evidence that the contents of the recorded calls have been analyzed any more efficiently. Perhaps analysis by conventio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005